-
Justlookup: One Millisecond Deep Feature Extraction for Point Clouds By Lookup Tables
Authors:
Hongxin Lin,
Zelin Xiao,
Yang Tan,
Hongyang Chao,
Shengyong Ding
Abstract:
Deep models are capable of fitting complex high dimensional functions while usually yielding large computation load. There is no way to speed up the inference process by classical lookup tables due to the high-dimensional input and limited memory size. Recently, a novel architecture (PointNet) for point clouds has demonstrated that it is possible to obtain a complicated deep function from a set of…
▽ More
Deep models are capable of fitting complex high dimensional functions while usually yielding large computation load. There is no way to speed up the inference process by classical lookup tables due to the high-dimensional input and limited memory size. Recently, a novel architecture (PointNet) for point clouds has demonstrated that it is possible to obtain a complicated deep function from a set of 3-variable functions. In this paper, we exploit this property and apply a lookup table to encode these 3-variable functions. This method ensures that the inference time is only determined by the memory access no matter how complicated the deep function is. We conduct extensive experiments on ModelNet and ShapeNet datasets and demonstrate that we can complete the inference process in 1.5 ms on an Intel i7-8700 CPU (single core mode), 32x speedup over the PointNet architecture without any performance degradation.
△ Less
Submitted 14 August, 2019;
originally announced August 2019.
-
Distilling On-Device Intelligence at the Network Edge
Authors:
Jihong Park,
Shiqiang Wang,
Anis Elgabli,
Seungeun Oh,
Eunjeong Jeong,
Han Cha,
Hyesung Kim,
Seong-Lyun Kim,
Mehdi Bennis
Abstract:
Devices at the edge of wireless networks are the last mile data sources for machine learning (ML). As opposed to traditional ready-made public datasets, these user-generated private datasets reflect the freshest local environments in real time. They are thus indispensable for enabling mission-critical intelligent systems, ranging from fog radio access networks (RANs) to driverless cars and e-Healt…
▽ More
Devices at the edge of wireless networks are the last mile data sources for machine learning (ML). As opposed to traditional ready-made public datasets, these user-generated private datasets reflect the freshest local environments in real time. They are thus indispensable for enabling mission-critical intelligent systems, ranging from fog radio access networks (RANs) to driverless cars and e-Health wearables. This article focuses on how to distill high-quality on-device ML models using fog computing, from such user-generated private data dispersed across wirelessly connected devices. To this end, we introduce communication-efficient and privacy-preserving distributed ML frameworks, termed fog ML (FML), wherein on-device ML models are trained by exchanging model parameters, model outputs, and surrogate data. We then present advanced FML frameworks addressing wireless RAN characteristics, limited on-device resources, and imbalanced data distributions. Our study suggests that the full potential of FML can be reached by co-designing communication and distributed ML operations while accounting for heterogeneous hardware specifications, data characteristics, and user requirements.
△ Less
Submitted 16 August, 2019;
originally announced August 2019.
-
V2X-Based Vehicular Positioning: Opportunities, Challenges, and Future Directions
Authors:
Seung-Woo Ko,
Hyuk** Chae,
Kaifeng Han,
Seungmin Lee,
Dong-Wook Seo,
Kaibin Huang
Abstract:
Vehicle-to-Everything (V2X) will create many new opportunities in the area of wireless communications, while its feasibility on enabling vehicular positioning has not been explored yet. Vehicular positioning is a crucial operation for autonomous driving. Its complexity and stringent safety requirement render conventional technologies like RADAR and LIDAR inadequate. This article aims at investigat…
▽ More
Vehicle-to-Everything (V2X) will create many new opportunities in the area of wireless communications, while its feasibility on enabling vehicular positioning has not been explored yet. Vehicular positioning is a crucial operation for autonomous driving. Its complexity and stringent safety requirement render conventional technologies like RADAR and LIDAR inadequate. This article aims at investigating whether V2X can help vehicular positioning from different perspectives. We first explain V2X's critical advantages over other approaches and suggest new scenarios of V2X-based vehicular positioning. Then we review the state-of-the-art positioning techniques discussed in the ongoing 3GPP standardization and point out their limitations. Lastly, some promising research directions for V2X-based vehicular positioning are presented, which shed light on realizing fully autonomous driving by overcoming the current barriers.
△ Less
Submitted 2 March, 2020; v1 submitted 13 August, 2019;
originally announced August 2019.
-
Bounding Queue Delay in Cellular Networks to Support Ultra-Low Latency Applications
Authors:
Soheil Abbasloo,
H. Jonathan Chao
Abstract:
Most of the current active queue management (AQM) designs have major issues including severe hardship of being tuned for highly fluctuated cellular access link bandwidths. Consequently, most of the cellular network providers either give up using AQMs or use conservative offline configurations for them. However, these choices will significantly impact the performance of the emerging interactive and…
▽ More
Most of the current active queue management (AQM) designs have major issues including severe hardship of being tuned for highly fluctuated cellular access link bandwidths. Consequently, most of the cellular network providers either give up using AQMs or use conservative offline configurations for them. However, these choices will significantly impact the performance of the emerging interactive and highly delay sensitive applications such as virtual reality and vehicle-to-vehicle communications.
Therefore, in this paper, we investigate the problems of existing AQM schemes and show that they are not suitable options to support ultra-low latency applications in a highly dynamic network such as current and future cellular networks. Moreover, we believe that achieving good performance does not necessarily come from complex drop rate calculation algorithms or complicated AQM techniques. Consequently, we propose BoDe an extremely simple and deployment friendly AQM scheme to bound the queuing delay of served packets and support ultra-low latency applications.
We have evaluated BoDe in extensive trace-based evaluations using cellular traces from 3 different service providers in the US and compared its performance with state-of-the-art AQM designs including CoDel and PIE under a variety of streaming applications, video conferencing applications, and various recently proposed TCP protocols. Results show that despite BoDe's simple design, it outperforms other schemes and achieves significantly lower queuing delay in all tested scenarios.
△ Less
Submitted 2 August, 2019;
originally announced August 2019.
-
Power-Consumption Outage Challenge in Next-Generation Cellular Networks
Authors:
**g Yang,
Yi Zhong,
Xiaohu Ge,
Han-Chieh Chao
Abstract:
The conventional outage in wireless communication systems is caused by the deterioration of the wireless communication link, i.e., the received signal power is less than the minimum received signal power. Is there a possibility that the outage occurs in wireless communication systems with a good channel state? Based on both communication and heat transfer theories, a power-consumption outage in th…
▽ More
The conventional outage in wireless communication systems is caused by the deterioration of the wireless communication link, i.e., the received signal power is less than the minimum received signal power. Is there a possibility that the outage occurs in wireless communication systems with a good channel state? Based on both communication and heat transfer theories, a power-consumption outage in the wireless communication between millimeter wave (mmWave) massive multiple-input multiple-output (MIMO) base stations (BSs) and smartphones has been modeled and analyzed. Moreover, the total transmission time model with respect to the number of power-consumption outages is derived for mmWave massive MIMO communication systems. Simulation results indicate that the total transmission time is extended by the power-consumption outage, which deteriorates the average transmission rate of mmWave massive MIMO BSs.
△ Less
Submitted 19 July, 2019;
originally announced July 2019.
-
Federated Reinforcement Distillation with Proxy Experience Memory
Authors:
Han Cha,
Jihong Park,
Hyesung Kim,
Seong-Lyun Kim,
Mehdi Bennis
Abstract:
In distributed reinforcement learning, it is common to exchange the experience memory of each agent and thereby collectively train their local models. The experience memory, however, contains all the preceding state observations and their corresponding policies of the host agent, which may violate the privacy of the agent. To avoid this problem, in this work, we propose a privacy-preserving distri…
▽ More
In distributed reinforcement learning, it is common to exchange the experience memory of each agent and thereby collectively train their local models. The experience memory, however, contains all the preceding state observations and their corresponding policies of the host agent, which may violate the privacy of the agent. To avoid this problem, in this work, we propose a privacy-preserving distributed reinforcement learning (RL) framework, termed federated reinforcement distillation (FRD). The key idea is to exchange a proxy experience memory comprising a pre-arranged set of states and time-averaged policies, thereby preserving the privacy of actual experiences. Based on an advantage actor-critic RL architecture, we numerically evaluate the effectiveness of FRD and investigate how the performance of FRD is affected by the proxy memory structure and different memory exchanging rules.
△ Less
Submitted 13 April, 2020; v1 submitted 15 July, 2019;
originally announced July 2019.
-
Intelligent Anomaly Detection and Mitigation in Data Centers
Authors:
Ashkan Aghdai,
Kang Xi,
H. Jonathan Chao
Abstract:
Data centers play a key role in today's Internet. Cloud applications are mainly hosted on multi-tenant warehouse-scale data centers. Anomalies pose a serious threat to data centers' operations. If not controlled properly, a simple anomaly can spread throughout the data center, resulting in a cascading failure. Amazon AWS had been affected by such incidents recently. Although some solutions are pro…
▽ More
Data centers play a key role in today's Internet. Cloud applications are mainly hosted on multi-tenant warehouse-scale data centers. Anomalies pose a serious threat to data centers' operations. If not controlled properly, a simple anomaly can spread throughout the data center, resulting in a cascading failure. Amazon AWS had been affected by such incidents recently. Although some solutions are proposed to detect anomalies and prevent cascading failures, they mainly rely on application-specific metrics and case-based diagnosis to detect the anomalies. Given the variety of applications on a multi-tenant data center, proposed solutions are not capable of detecting anomalies in a timely manner. In this paper we design an application-agnostic anomaly detection scheme. More specifically, our design uses a highly distributed data mining scheme over network-level traffic metrics to detect anomalies. Once anomalies are detected, simple actions are taken to mitigate the damage. This ensures that errors are confined and prevents cascading failures before administrators intervene.
△ Less
Submitted 14 June, 2019;
originally announced June 2019.
-
Low-loss composite photonic platform based on 2D semiconductor monolayers
Authors:
Ipshita Datta,
Sang Hoon Chae,
Gaurang R. Bhatt,
Mohammad A. Tadayon,
Baichang Li,
Yiling Yu,
Chibeom Park,
Jiwoong Park,
Linyou Cao,
D. N. Basov,
James Hone,
Michal Lipson
Abstract:
Two dimensional materials such as graphene and transition metal dichalcogenides (TMDs) are promising for optical modulation, detection, and light emission since their material properties can be tuned on-demand via electrostatic do**. The optical properties of TMDs have been shown to change drastically with do** in the wavelength range near the excitonic resonances. However, little is known abo…
▽ More
Two dimensional materials such as graphene and transition metal dichalcogenides (TMDs) are promising for optical modulation, detection, and light emission since their material properties can be tuned on-demand via electrostatic do**. The optical properties of TMDs have been shown to change drastically with do** in the wavelength range near the excitonic resonances. However, little is known about the effect of do** on the optical properties of TMDs away from these resonances, where the material is transparent and therefore could be leveraged in photonic circuits. Here, we probe the electro-optic response of monolayer TMDs at near infrared (NIR) wavelengths (i.e. deep in the transparency regime), by integrating them on silicon nitride (SiN) photonic structures to induce strong light$-$matter interaction with the monolayer. We dope the monolayer to carrier densities of ($7.2 \pm 0.8$) $\times$ $10^{13} \textrm{cm}^{-2}$, by electrically gating the TMD using an ionic liquid. We show strong electro-refractive response in monolayer tungsten disulphide (WS$_2$) at NIR wavelengths by measuring a large change in the real part of refractive index $Δ$n = $0.53$, with only a minimal change in the imaginary part $Δ$k = $0.004$. The do** induced phase change ($Δ$n), compared to the induced absorption ($Δ$k) measured for WS$_2$ ($Δ$n/$Δ$k $\sim 125$), a key metric for photonics, is an order of magnitude higher than the $Δ$n/$Δ$k for bulk materials like silicon ($Δ$n/$Δ$k $\sim 10$), making it ideal for various photonic applications. We further utilize this strong tunable effect to demonstrate an electrostatically gated SiN-WS$_2$ phase modulator using a WS$_2$-HfO$_2$ (Hafnia)-ITO (Indium Tin Oxide) capacitive configuration, that achieves a phase modulation efficiency (V$_π$L) of 0.8 V $\cdot$ cm with a RC limited bandwidth of 0.3 GHz.
△ Less
Submitted 2 June, 2019;
originally announced June 2019.
-
Toward Optimal Performance with Network Assisted TCP at Mobile Edge
Authors:
Soheil Abbasloo,
Yang Xu,
H. Jonathon Chao,
Hang Shi,
Ulas C. Kozat,
Yinghua Ye
Abstract:
In contrast to the classic fashion for designing distributed end-to-end (e2e) TCP schemes for cellular networks (CN), we explore another design space by having the CN assist the task of the transport control. We show that in the emerging cellular architectures such as mobile/multi-access edge computing (MEC), where the servers are located close to the radio access network (RAN), significant improv…
▽ More
In contrast to the classic fashion for designing distributed end-to-end (e2e) TCP schemes for cellular networks (CN), we explore another design space by having the CN assist the task of the transport control. We show that in the emerging cellular architectures such as mobile/multi-access edge computing (MEC), where the servers are located close to the radio access network (RAN), significant improvements can be achieved by leveraging the nature of the logically centralized network measurements at the RAN and passing information such as its minimum e2e delay and access link capacity to each server. Particularly, a Network Assistance module (located at the mobile edge) will pair up with wireless scheduler to provide feedback information to each server and facilitate the task of congestion control. To that end, we present two Network Assisted schemes called NATCP (a clean-slate design replacing TCP at end-hosts) and NACubic (a backward compatible design requiring no change for TCP at end-hosts). Our preliminary evaluations using real cellular traces show that both schemes dramatically outperform existing schemes both in single-flow and multi-flow scenarios.
△ Less
Submitted 22 May, 2019;
originally announced May 2019.
-
Enabling Mobility in LTE-Compatible Mobile-edge Computing with Programmable Switches
Authors:
Ashkan Aghdai,
Yang Xu,
Mark Huang,
David H. Dai,
H. Jonathan Chao
Abstract:
Network softwarization triggered a new wave of innovation in modern network design. The next generation of mobile networks embraces this trend. Mobile-edge computing (MEC) is a key part of emerging mobile networks that enables ultra-low latency mission-critical application such as vehicle-to vehicle communication. MEC aims at bringing delay-sensitive applications closer to the radio access network…
▽ More
Network softwarization triggered a new wave of innovation in modern network design. The next generation of mobile networks embraces this trend. Mobile-edge computing (MEC) is a key part of emerging mobile networks that enables ultra-low latency mission-critical application such as vehicle-to vehicle communication. MEC aims at bringing delay-sensitive applications closer to the radio access network to enable ultra-low latency for users and decrease the back-haul pressure on mobile service providers. However, there are no practical solutions to enable mobility at MEC where connections are no longer anchored to the core network and serving applications are supposed to move as their users move. We propose the mobile-edge gateway (MEGW) to address this gap. MEGW enables mobility for MEC applications transparently and without requiring any modifications to existing protocols and applications. MEGW supports mobility by reconstructing mobile users' location via listening to LTE control plane in addition to using two-stage location-dependent traffic steering for edge connections. Networks can incrementally upgrade to support MEC by upgrading some IP router to programmable switches that run MEGW. We have implemented MEGW using P4 language and verified its compatibility with existing LTE networks in a testbed running reference LTE protocol stack. Furthermore, using packet-level simulations we show that the two-stage traffic steering algorithm reduces the number of application migrations and simplifies service provisioning.
△ Less
Submitted 13 May, 2019;
originally announced May 2019.
-
Temporal Deformable Convolutional Encoder-Decoder Networks for Video Captioning
Authors:
**gwen Chen,
Yingwei Pan,
Yehao Li,
Ting Yao,
Hongyang Chao,
Tao Mei
Abstract:
It is well believed that video captioning is a fundamental but challenging task in both computer vision and artificial intelligence fields. The prevalent approach is to map an input video to a variable-length output sentence in a sequence to sequence manner via Recurrent Neural Network (RNN). Nevertheless, the training of RNN still suffers to some degree from vanishing/exploding gradient problem,…
▽ More
It is well believed that video captioning is a fundamental but challenging task in both computer vision and artificial intelligence fields. The prevalent approach is to map an input video to a variable-length output sentence in a sequence to sequence manner via Recurrent Neural Network (RNN). Nevertheless, the training of RNN still suffers to some degree from vanishing/exploding gradient problem, making the optimization difficult. Moreover, the inherently recurrent dependency in RNN prevents parallelization within a sequence during training and therefore limits the computations. In this paper, we present a novel design --- Temporal Deformable Convolutional Encoder-Decoder Networks (dubbed as TDConvED) that fully employ convolutions in both encoder and decoder networks for video captioning. Technically, we exploit convolutional block structures that compute intermediate states of a fixed number of inputs and stack several blocks to capture long-term relationships. The structure in encoder is further equipped with temporal deformable convolution to enable free-form deformation of temporal sampling. Our model also capitalizes on temporal attention mechanism for sentence generation. Extensive experiments are conducted on both MSVD and MSR-VTT video captioning datasets, and superior results are reported when comparing to conventional RNN-based encoder-decoder techniques. More remarkably, TDConvED increases CIDEr-D performance from 58.8% to 67.2% on MSVD.
△ Less
Submitted 3 May, 2019;
originally announced May 2019.
-
Fast Utility Mining on Complex Sequences
Authors:
Wensheng Gan,
Jerry Chun-Wei Lin,
Jiexiong Zhang,
Philippe Fournier-Viger,
Han-Chieh Chao,
Philip S. Yu
Abstract:
High-utility sequential pattern mining is an emerging topic in the field of Knowledge Discovery in Databases. It consists of discovering subsequences having a high utility (importance) in sequences, referred to as high-utility sequential patterns (HUSPs). HUSPs can be applied to many real-life applications, such as market basket analysis, E-commerce recommendation, click-stream analysis and scenic…
▽ More
High-utility sequential pattern mining is an emerging topic in the field of Knowledge Discovery in Databases. It consists of discovering subsequences having a high utility (importance) in sequences, referred to as high-utility sequential patterns (HUSPs). HUSPs can be applied to many real-life applications, such as market basket analysis, E-commerce recommendation, click-stream analysis and scenic route planning. For example, in economics and targeted marketing, understanding economic behavior of consumers is quite challenging, such as finding credible and reliable information on product profitability. Several algorithms have been proposed to address this problem by efficiently mining utility-based useful sequential patterns. Nevertheless, the performance of these algorithms can be unsatisfying in terms of runtime and memory usage due to the combinatorial explosion of the search space for low utility threshold and large databases. Hence, this paper proposes a more efficient algorithm for the task of high-utility sequential pattern mining, called HUSP-ULL. It utilizes a lexicographic sequence (LS)-tree and a utility-linked (UL)-list structure to fast discover HUSPs. Furthermore, two pruning strategies are introduced in HUSP-ULL to obtain tight upper-bounds on the utility of candidate sequences, and reduce the search space by pruning unpromising candidates early. Substantial experiments both on real-life and synthetic datasets show that the proposed algorithm can effectively and efficiently discover the complete set of HUSPs and outperforms the state-of-the-art algorithms.
△ Less
Submitted 27 April, 2019;
originally announced April 2019.
-
Pointing Novel Objects in Image Captioning
Authors:
Yehao Li,
Ting Yao,
Yingwei Pan,
Hongyang Chao,
Tao Mei
Abstract:
Image captioning has received significant attention with remarkable improvements in recent advances. Nevertheless, images in the wild encapsulate rich knowledge and cannot be sufficiently described with models built on image-caption pairs containing only in-domain objects. In this paper, we propose to address the problem by augmenting standard deep captioning architectures with object learners. Sp…
▽ More
Image captioning has received significant attention with remarkable improvements in recent advances. Nevertheless, images in the wild encapsulate rich knowledge and cannot be sufficiently described with models built on image-caption pairs containing only in-domain objects. In this paper, we propose to address the problem by augmenting standard deep captioning architectures with object learners. Specifically, we present Long Short-Term Memory with Pointing (LSTM-P) --- a new architecture that facilitates vocabulary expansion and produces novel objects via pointing mechanism. Technically, object learners are initially pre-trained on available object recognition data. Pointing in LSTM-P then balances the probability between generating a word through LSTM and copying a word from the recognized objects at each time step in decoder stage. Furthermore, our captioning encourages global coverage of objects in the sentence. Extensive experiments are conducted on both held-out COCO image captioning and ImageNet datasets for describing novel objects, and superior results are reported when comparing to state-of-the-art approaches. More remarkably, we obtain an average of 60.9% in F1 score on held-out COCO~dataset.
△ Less
Submitted 25 April, 2019;
originally announced April 2019.
-
ProUM: Projection-based Utility Mining on Sequence Data
Authors:
Wensheng Gan,
Jerry Chun-Wei Lin,
Jiexiong Zhang,
Han-Chieh Chao,
Hamido Fujita,
Philip S. Yu
Abstract:
Utility is an important concept in economics. A variety of applications consider utility in real-life situations, which has lead to the emergence of utility-oriented mining (also called utility mining) in the recent decade. Utility mining has attracted a great amount of attention, but most of the existing studies have been developed to deal with itemset-based data. Time-ordered sequence data is mo…
▽ More
Utility is an important concept in economics. A variety of applications consider utility in real-life situations, which has lead to the emergence of utility-oriented mining (also called utility mining) in the recent decade. Utility mining has attracted a great amount of attention, but most of the existing studies have been developed to deal with itemset-based data. Time-ordered sequence data is more commonly seen in real-world situations, which is different from itemset-based data. Since they are time-consuming and require large amount of memory usage, current utility mining algorithms still have limitations when dealing with sequence data. In addition, the mining efficiency of utility mining on sequence data still needs to be improved, especially for long sequences or when there is a low minimum utility threshold. In this paper, we propose an efficient Projection-based Utility Mining (ProUM) approach to discover high-utility sequential patterns from sequence data. The utility-array structure is designed to store the necessary information of the sequence-order and utility. ProUM can significantly improve the mining efficiency by utilizing the projection technique in generating utility-array, and it effectively reduces the memory consumption. Furthermore, a new upper bound named sequence extension utility is proposed and several pruning strategies are further applied to improve the efficiency of ProUM. By taking utility theory into account, the derived high-utility sequential patterns have more insightful and interesting information than other kinds of patterns. Experimental results showed that the proposed ProUM algorithm significantly outperformed the state-of-the-art algorithms in terms of execution time, memory usage, and scalability.
△ Less
Submitted 12 September, 2019; v1 submitted 16 April, 2019;
originally announced April 2019.
-
Learning Pyramid-Context Encoder Network for High-Quality Image Inpainting
Authors:
Yanhong Zeng,
Jianlong Fu,
Hongyang Chao,
Baining Guo
Abstract:
High-quality image inpainting requires filling missing regions in a damaged image with plausible content. Existing works either fill the regions by copying image patches or generating semantically-coherent patches from region context, while neglect the fact that both visual and semantic plausibility are highly-demanded. In this paper, we propose a Pyramid-context ENcoder Network (PEN-Net) for imag…
▽ More
High-quality image inpainting requires filling missing regions in a damaged image with plausible content. Existing works either fill the regions by copying image patches or generating semantically-coherent patches from region context, while neglect the fact that both visual and semantic plausibility are highly-demanded. In this paper, we propose a Pyramid-context ENcoder Network (PEN-Net) for image inpainting by deep generative models. The PEN-Net is built upon a U-Net structure, which can restore an image by encoding contextual semantics from full resolution input, and decoding the learned semantic features back into images. Specifically, we propose a pyramid-context encoder, which progressively learns region affinity by attention from a high-level semantic feature map and transfers the learned attention to the previous low-level feature map. As the missing content can be filled by attention transfer from deep to shallow in a pyramid fashion, both visual and semantic coherence for image inpainting can be ensured. We further propose a multi-scale decoder with deeply-supervised pyramid losses and an adversarial loss. Such a design not only results in fast convergence in training, but more realistic results in testing. Extensive experiments on various datasets show the superior performance of the proposed network
△ Less
Submitted 10 July, 2019; v1 submitted 16 April, 2019;
originally announced April 2019.
-
Correlated Utility-based Pattern Mining
Authors:
Wensheng Gan,
Jerry Chun-Wei Lin,
Han-Chieh Chao,
Hamido Fujita,
Philip S. Yu
Abstract:
In the field of data mining and analytics, the utility theory from Economic can bring benefits in many real-life applications. In recent decade, a new research field called utility-oriented mining has already attracted great attention. Previous studies have, however, the limitation that they rarely consider the inherent correlation of items among patterns. Consider the purchase behaviors of consum…
▽ More
In the field of data mining and analytics, the utility theory from Economic can bring benefits in many real-life applications. In recent decade, a new research field called utility-oriented mining has already attracted great attention. Previous studies have, however, the limitation that they rarely consider the inherent correlation of items among patterns. Consider the purchase behaviors of consumer, a high-utility group of products (w.r.t. multi-products) may contain several very high-utility products with some low-utility products. However, it is considered as a valuable pattern even if this behavior/pattern may be not highly correlated, or even happen by chance. In this paper, in light of these challenges, we propose an efficient utility mining approach namely non-redundant Correlated high-Utility Pattern Miner (CoUPM) by taking positive correlation and profitable value into account. The derived patterns with high utility and strong positive correlation can lead to more insightful availability than those patterns only have high profitable values. The utility-list structure is revised and applied to store necessary information of both correlation and utility. Several pruning strategies are further developed to improve the efficiency for discovering the desired patterns. Experimental results show that the non-redundant correlated high-utility patterns have more effectiveness than some other kinds of interesting patterns. Moreover, efficiency of the proposed CoUPM algorithm significantly outperforms the state-of-the-art algorithm.
△ Less
Submitted 27 April, 2019; v1 submitted 5 April, 2019;
originally announced April 2019.
-
Utility-driven Data Analytics on Uncertain Data
Authors:
Wensheng Gan,
Jerry Chun-Wei Lin,
Han-Chieh Chao,
Athanasios V. Vasilakos,
Philip S. Yu
Abstract:
Modern Internet of Things (IoT) applications generate massive amounts of data, much of it in the form of objects/items of readings, events, and log entries. Specifically, most of the objects in these IoT data contain rich embedded information (e.g., frequency and uncertainty) and different level of importance (e.g., unit utility of items, interestingness, cost, risk, or weight). Many existing appr…
▽ More
Modern Internet of Things (IoT) applications generate massive amounts of data, much of it in the form of objects/items of readings, events, and log entries. Specifically, most of the objects in these IoT data contain rich embedded information (e.g., frequency and uncertainty) and different level of importance (e.g., unit utility of items, interestingness, cost, risk, or weight). Many existing approaches in data mining and analytics have limitations such as only the binary attribute is considered within a transaction, as well as all the objects/items having equal weights or importance. To solve these drawbacks, a novel utility-driven data analytics algorithm named HUPNU is presented, to extract High-Utility patterns by considering both Positive and Negative unit utilities from Uncertain data. The qualified high-utility patterns can be effectively discovered for risk prediction, manufacturing management, decision-making, among others. By using the developed vertical Probability-Utility list with the Positive-and-Negative utilities structure, as well as several effective pruning strategies. Experiments showed that the developed HUPNU approach performed great in mining the qualified patterns efficiently and effectively.
△ Less
Submitted 25 February, 2019;
originally announced February 2019.
-
Beyond Frequency: Utility Mining with Varied Item-Specific Minimum Utility
Authors:
Wensheng Gan,
Jerry Chun-Wei Lin,
Philippe Fournier-Viger,
Han-Chieh Chao,
Philip S Yu
Abstract:
Utility-oriented mining which integrates utility theory and data mining is a useful tool for understanding economic consumer behavior. Traditional algorithms for mining high-utility patterns (HUPs) applies a single/uniform minimum high-utility threshold (minutil) to obtain the set of HUPs, but in some real-life circumstances, some specific products may bring lower utilities compared with others, b…
▽ More
Utility-oriented mining which integrates utility theory and data mining is a useful tool for understanding economic consumer behavior. Traditional algorithms for mining high-utility patterns (HUPs) applies a single/uniform minimum high-utility threshold (minutil) to obtain the set of HUPs, but in some real-life circumstances, some specific products may bring lower utilities compared with others, but their profit may offer some vital information. However, if minutil is set high, the patterns with low minutil are missed; if minutil is set low, the number of patterns becomes unmanageable. In this paper, an efficient one-phase utility-oriented pattern mining algorithm, called HIMU, is proposed for mining HUPs with varied item-specific minimum utility. A novel tree structure called a multiple item utility set-enumeration tree (MIU-tree), the global sorted and the conditional downward closure properties are introduced in HIMU. In addition, we extended the compact utility-list structure to keep the necessary information, and thus this one-phase HIMU model greatly reduces the computational costs and memory requirements. Moreover, two pruning strategies are then extended to enhance the performance. We conducted extensive experiments in several synthetic and real-world datasets; the results indicates that the designed one-phase HIMU algorithm can address the "rare item problem" and has better performance than the state-of-the-art algorithms in terms of runtime, memory usage, and scalability. Furthermore, the enhanced algorithms outperform the non-optimized HIMU approach.
△ Less
Submitted 25 February, 2019;
originally announced February 2019.
-
Utility Mining Across Multi-Dimensional Sequences
Authors:
Wensheng Gan,
Jerry Chun-Wei Lin,
Jiexiong Zhang,
Hongzhi Yin,
Philippe Fournier-Viger,
Han-Chieh Chao,
Philip S. Yu
Abstract:
Knowledge extraction from database is the fundamental task in database and data mining community, which has been applied to a wide range of real-world applications and situations. Different from the support-based mining models, the utility-oriented mining framework integrates the utility theory to provide more informative and useful patterns. Time-dependent sequence data is commonly seen in real l…
▽ More
Knowledge extraction from database is the fundamental task in database and data mining community, which has been applied to a wide range of real-world applications and situations. Different from the support-based mining models, the utility-oriented mining framework integrates the utility theory to provide more informative and useful patterns. Time-dependent sequence data is commonly seen in real life. Sequence data has been widely utilized in many applications, such as analyzing sequential user behavior on the Web, influence maximization, route planning, and targeted marketing. Unfortunately, all the existing algorithms lose sight of the fact that the processed data not only contain rich features (e.g., occur quantity, risk, profit, etc.), but also may be associated with multi-dimensional auxiliary information, e.g., transaction sequence can be associated with purchaser profile information. In this paper, we first formulate the problem of utility mining across multi-dimensional sequences, and propose a novel framework named MDUS to extract Multi-Dimensional Utility-oriented Sequential useful patterns. Two algorithms respectively named MDUS_EM and MDUS_SD are presented to address the formulated problem. The former algorithm is based on database transformation, and the later one performs pattern joins and a searching method to identify desired patterns across multi-dimensional sequences. Extensive experiments are carried on five real-life datasets and one synthetic dataset to show that the proposed algorithms can effectively and efficiently discover the useful knowledge from multi-dimensional sequential databases. Moreover, the MDUS framework can provide better insight, and it is more adaptable to real-life situations than the current existing models.
△ Less
Submitted 25 February, 2019;
originally announced February 2019.
-
HUOPM: High Utility Occupancy Pattern Mining
Authors:
Wensheng Gan,
Jerry Chun-Wei Lin,
Philippe Fournier-Viger,
Han-Chieh Chao,
Philip S. Yu
Abstract:
Mining useful patterns from varied types of databases is an important research topic, which has many real-life applications. Most studies have considered the frequency as sole interestingness measure for identifying high quality patterns. However, each object is different in nature. The relative importance of objects is not equal, in terms of criteria such as the utility, risk, or interest. Beside…
▽ More
Mining useful patterns from varied types of databases is an important research topic, which has many real-life applications. Most studies have considered the frequency as sole interestingness measure for identifying high quality patterns. However, each object is different in nature. The relative importance of objects is not equal, in terms of criteria such as the utility, risk, or interest. Besides, another limitation of frequent patterns is that they generally have a low occupancy, i.e., they often represent small sets of items in transactions containing many items, and thus may not be truly representative of these transactions. To extract high quality patterns in real life applications, this paper extends the occupancy measure to also assess the utility of patterns in transaction databases. We propose an efficient algorithm named High Utility Occupancy Pattern Mining (HUOPM). It considers user preferences in terms of frequency, utility, and occupancy. A novel Frequency-Utility tree (FU-tree) and two compact data structures, called the utility-occupancy list and FU-table, are designed to provide global and partial downward closure properties for pruning the search space. The proposed method can efficiently discover the complete set of high quality patterns without candidate generation. Extensive experiments have been conducted on several datasets to evaluate the effectiveness and efficiency of the proposed algorithm. Results show that the derived patterns are intelligible, reasonable and acceptable, and that HUOPM with its pruning strategies outperforms the state-of-the-art algorithm, in terms of runtime and search space, respectively.
△ Less
Submitted 28 December, 2018;
originally announced December 2018.
-
Toward Intelligent Network Optimization in Wireless Networking: An Auto-learning Framework
Authors:
Wenyu Zhang,
Zhenjiang Zhang,
Han-Chieh Chao,
Mohsen Guizani
Abstract:
In wireless communication systems (WCSs), the network optimization problems (NOPs) play an important role in maximizing system performances by setting appropriate network configurations. When dealing with NOPs by using conventional optimization methodologies, there exist the following three problems: human intervention, model invalid, and high computation complexity. As such, in this article we pr…
▽ More
In wireless communication systems (WCSs), the network optimization problems (NOPs) play an important role in maximizing system performances by setting appropriate network configurations. When dealing with NOPs by using conventional optimization methodologies, there exist the following three problems: human intervention, model invalid, and high computation complexity. As such, in this article we propose an auto-learning framework (ALF) to achieve intelligent and automatic network optimization by using machine learning (ML) techniques. We review the basic concepts of ML techniques, and propose their rudimentary employment models in WCSs, including automatic model construction, experience replay, efficient trial-and-error, RL-driven gaming, complexity reduction, and solution recommendation. We hope these proposals can provide new insights and motivations in future researches for dealing with NOPs in WCSs by using ML techniques.
△ Less
Submitted 19 December, 2018;
originally announced December 2018.
-
A Regularized Spatial Market Segmentation Method with Dirichlet Process Gaussian Mixture Prior
Authors:
Won Chang,
Sunghoon Kim,
Heewon Chae
Abstract:
Spatially referenced data are increasingly available thanks to the development of modern GPS technology. They also provide rich opportunities for spatial analytics in the field of marketing science. Our main interest is to propose a new efficient statistical framework to conduct spatial segmentation analysis for restaurants located in a metropolitan area in the U.S. The spatial segmentation proble…
▽ More
Spatially referenced data are increasingly available thanks to the development of modern GPS technology. They also provide rich opportunities for spatial analytics in the field of marketing science. Our main interest is to propose a new efficient statistical framework to conduct spatial segmentation analysis for restaurants located in a metropolitan area in the U.S. The spatial segmentation problem poses important statistical challenges: selecting the optimal number of underlying structures of market segments, capturing complex and flexible spatial structures, and resolving any possible small n and large p issue which can be typical in latent class analysis. Existing approaches try to tackle these issues in heuristic ways or seem silent on them. To overcome these challenges, we propose a new statistical framework based on regularized Bayesian spatial mixture regressions with Dirichlet process integrating ridge or lasso regularization. Our simulation study demonstrates that the proposed models successfully recover the underlying spatial clustering structures and outperforms two existing benchmark models. In the empirical analysis using online customer satisfaction data from the Yelp, our models provides interesting insights on segment-level key drivers of customer satisfaction and interpretable relationships between regional demographics and restaurants' characteristics.
△ Less
Submitted 23 November, 2018;
originally announced November 2018.
-
In-network Congestion-aware Load Balancing at Transport Layer
Authors:
Ashkan Aghdai,
Michael I. -C. Wang,
Yang Xu,
Charles H. -P. Wen,
H. Jonathan Chao
Abstract:
Load balancing at transport layer is an important function in data centers, content delivery networks, and mobile networks, where per-connection consistency (PCC) has to be met for optimal performance. Cloud-native L4 load balancers are commonly deployed as virtual network functions (VNFs) and are a critical forwarding element in modern cloud infrastructure. We identify load imbalance among servic…
▽ More
Load balancing at transport layer is an important function in data centers, content delivery networks, and mobile networks, where per-connection consistency (PCC) has to be met for optimal performance. Cloud-native L4 load balancers are commonly deployed as virtual network functions (VNFs) and are a critical forwarding element in modern cloud infrastructure. We identify load imbalance among service instances as the main cause of additional processing delay caused by transport-layer load balancers. Existing transport-layer load balancers rely on one of two methods: host-level traffic redirection, which may add as much as 12.48% additional traffic to underlying networks, or connection tracking, which consumes a considerable amount of memory in load balancers. Both of these methods result in inefficient usage of network resources. We propose the in-network congestion-aware load Balancer (INCAB) to achieve even load distribution among service instances and optimal network resources usage in addition to meeting the PCC requirement. We show that INCAB is capable of identifying and monitoring each instance's most-utilized resource and can improve the load distribution among all service instances. INCAB utilizes a Bloom filter and an ultra-compact connection table for in-network flow distribution. Furthermore, it does not rely on end hosts for traffic redirection. Our flow level simulations show that INCAB improves flows' average completion time by 31.97% compared to stateless solutions.
△ Less
Submitted 13 June, 2019; v1 submitted 23 November, 2018;
originally announced November 2018.
-
Privacy Preserving Utility Mining: A Survey
Authors:
Wensheng Gan,
Jerry Chun-Wei Lin,
Han-Chieh Chao,
Shyue-Liang Wang,
Philip S. Yu
Abstract:
In big data era, the collected data usually contains rich information and hidden knowledge. Utility-oriented pattern mining and analytics have shown a powerful ability to explore these ubiquitous data, which may be collected from various fields and applications, such as market basket analysis, retail, click-stream analysis, medical analysis, and bioinformatics. However, analysis of these data with…
▽ More
In big data era, the collected data usually contains rich information and hidden knowledge. Utility-oriented pattern mining and analytics have shown a powerful ability to explore these ubiquitous data, which may be collected from various fields and applications, such as market basket analysis, retail, click-stream analysis, medical analysis, and bioinformatics. However, analysis of these data with sensitive private information raises privacy concerns. To achieve better trade-off between utility maximizing and privacy preserving, Privacy-Preserving Utility Mining (PPUM) has become a critical issue in recent years. In this paper, we provide a comprehensive overview of PPUM. We first present the background of utility mining, privacy-preserving data mining and PPUM, then introduce the related preliminaries and problem formulation of PPUM, as well as some key evaluation criteria for PPUM. In particular, we present and discuss the current state-of-the-art PPUM algorithms, as well as their advantages and deficiencies in detail. Finally, we highlight and discuss some technical challenges and open directions for future research on PPUM.
△ Less
Submitted 18 November, 2018;
originally announced November 2018.
-
GaitSet: Regarding Gait as a Set for Cross-View Gait Recognition
Authors:
Hanqing Chao,
Yiwei He,
Jun** Zhang,
Jianfeng Feng
Abstract:
As a unique biometric feature that can be recognized at a distance, gait has broad applications in crime prevention, forensic identification and social security. To portray a gait, existing gait recognition methods utilize either a gait template, where temporal information is hard to preserve, or a gait sequence, which must keep unnecessary sequential constraints and thus loses the flexibility of…
▽ More
As a unique biometric feature that can be recognized at a distance, gait has broad applications in crime prevention, forensic identification and social security. To portray a gait, existing gait recognition methods utilize either a gait template, where temporal information is hard to preserve, or a gait sequence, which must keep unnecessary sequential constraints and thus loses the flexibility of gait recognition. In this paper we present a novel perspective, where a gait is regarded as a set consisting of independent frames. We propose a new network named GaitSet to learn identity information from the set. Based on the set perspective, our method is immune to permutation of frames, and can naturally integrate frames from different videos which have been filmed under different scenarios, such as diverse viewing angles, different clothes/carrying conditions. Experiments show that under normal walking conditions, our single-model method achieves an average rank-1 accuracy of 95.0% on the CASIA-B gait dataset and an 87.1% accuracy on the OU-MVLP gait dataset. These results represent new state-of-the-art recognition accuracy. On various complex scenarios, our model exhibits a significant level of robustness. It achieves accuracies of 87.2% and 70.4% on CASIA-B under bag-carrying and coat-wearing walking conditions, respectively. These outperform the existing best methods by a large margin. The method presented can also achieve a satisfactory accuracy with a small number of frames in a test sample, e.g., 82.5% on CASIA-B with only 7 frames. The source code has been released at https://github.com/AbnerHqC/GaitSet.
△ Less
Submitted 12 December, 2018; v1 submitted 15 November, 2018;
originally announced November 2018.
-
C2TCP: A Flexible Cellular TCP to Meet Stringent Delay Requirements
Authors:
Soheil Abbasloo,
Yang Xu,
H. Jonathan Chao
Abstract:
Since current widely available network protocols/systems are mainly throughput-oriented designs, meeting stringent delay requirements of new applications such as virtual reality and vehicle-to-vehicle communications on cellular network requires new network protocol/system designs. C2TCP is an effort toward that new design direction.
C2TCP is inspired by in-network active queue management (AQM) d…
▽ More
Since current widely available network protocols/systems are mainly throughput-oriented designs, meeting stringent delay requirements of new applications such as virtual reality and vehicle-to-vehicle communications on cellular network requires new network protocol/system designs. C2TCP is an effort toward that new design direction.
C2TCP is inspired by in-network active queue management (AQM) designs such as RED and CoDel and motivated by lack of a flexible end-to-end (e2e) approach which can adapt itself to different applications' QoS requirements without modifying any network devices. It copes with unique challenges in cellular networks for achieving ultra-low latency (including highly variable channels, deep per-user buffers, self-inflicted queuing delays, radio uplink/downlink scheduling delays) and intends to satisfy stringent delay requirements of different applications while maximizing the throughput. C2TCP works on top of classic throughput-oriented TCP and accommodates various target delays without requiring any channel prediction, network state profiling, or complicated rate adjustment mechanisms.
We have evaluated C2TCP in both real-world environment and extensive trace-based emulations and compared its performance with different TCP variants and state-of-the-art schemes including PCC-Vivace, Google's BBR, Verus, Sprout, TCP Westwood, and Cubic. Results show that C2TCP outperforms all these schemes and achieves lower average delay, jitter, and 95th percentile delay for packets.
△ Less
Submitted 3 December, 2018; v1 submitted 29 October, 2018;
originally announced October 2018.
-
PETRA IV study with non-interleaved sextupole scheme
Authors:
Hung-Chun Chao,
Xavier Nuel Gavalda,
Reinhard Brinkmann
Abstract:
This study is to use the non-interleaved sextupole scheme to design PETRA IV storage ring, which is an upgrade from PETRA III, toward diffraction-limit synchrotron light source. The lattice is constructed by mixing different types of cells. Double minus identity cell is responsible for the chromaticity correction with non-interleaved sextupoles, while the combined function FODO cells provide strai…
▽ More
This study is to use the non-interleaved sextupole scheme to design PETRA IV storage ring, which is an upgrade from PETRA III, toward diffraction-limit synchrotron light source. The lattice is constructed by mixing different types of cells. Double minus identity cell is responsible for the chromaticity correction with non-interleaved sextupoles, while the combined function FODO cells provide straights with small beta functions for undulators. These are the basic building bricks. In addition, two hybrid sections with 10-m long super ID are custom-made to adapt to the configuration of DESY's current cite plan. The beam dynamic behaviors are simulated and discussed.
△ Less
Submitted 25 October, 2018; v1 submitted 24 October, 2018;
originally announced October 2018.
-
Face Recognition from Sequential Sparse 3D Data via Deep Registration
Authors:
Yang Tan,
Hongxin Lin,
Zelin Xiao,
Shengyong Ding,
Hongyang Chao
Abstract:
Previous works have shown that face recognition with high accurate 3D data is more reliable and insensitive to pose and illumination variations. Recently, low-cost and portable 3D acquisition techniques like ToF(Time of Flight) and DoE based structured light systems enable us to access 3D data easily, e.g., via a mobile phone. However, such devices only provide sparse(limited speckles in structure…
▽ More
Previous works have shown that face recognition with high accurate 3D data is more reliable and insensitive to pose and illumination variations. Recently, low-cost and portable 3D acquisition techniques like ToF(Time of Flight) and DoE based structured light systems enable us to access 3D data easily, e.g., via a mobile phone. However, such devices only provide sparse(limited speckles in structured light system) and noisy 3D data which can not support face recognition directly. In this paper, we aim at achieving high-performance face recognition for devices equipped with such modules which is very meaningful in practice as such devices will be very popular. We propose a framework to perform face recognition by fusing a sequence of low-quality 3D data. As 3D data are sparse and noisy which can not be well handled by conventional methods like the ICP algorithm, we design a PointNet-like Deep Registration Network(DRNet) which works with ordered 3D point coordinates while preserving the ability of mining local structures via convolution. Meanwhile we develop a novel loss function to optimize our DRNet based on the quaternion expression which obviously outperforms other widely used functions. For face recognition, we design a deep convolutional network which takes the fused 3D depth-map as input based on AMSoftmax model. Experiments show that our DRNet can achieve rotation error 0.95° and translation error 0.28mm for registration. The face recognition on fused data also achieves rank-1 accuracy 99.2% , FAR-0.001 97.5% on Bosphorus dataset which is comparable with state-of-the-art high-quality data based recognition performance.
△ Less
Submitted 4 April, 2019; v1 submitted 23 October, 2018;
originally announced October 2018.
-
Group Handover Management in Mobile Femtocellular Network Deployment
Authors:
Mostafa Zaman Chowdhury,
Sung Hun Chae,
Yeong Min Jang
Abstract:
The mobile femtocell is the new paradigm for the femtocellular network deployment. It can enhance the service quality for the users inside the vehicles. The deployment of mobile femtocells generates lot of handover calls. Also, number of group handover scenarios are found in mobile femtocellular network deployment. In this paper, we focus on the resource management for the group handover in mobile…
▽ More
The mobile femtocell is the new paradigm for the femtocellular network deployment. It can enhance the service quality for the users inside the vehicles. The deployment of mobile femtocells generates lot of handover calls. Also, number of group handover scenarios are found in mobile femtocellular network deployment. In this paper, we focus on the resource management for the group handover in mobile femtocellular network deployment. We discuss a number of group handover scenarios. We propose a resource management scheme that contains bandwidth adaptation policy and dynamic bandwidth reservation policy. The simulation results show that the proposed bandwidth management scheme significantly reduces the handover call drop** probability without reducing the bandwidth utilization.
△ Less
Submitted 4 October, 2018;
originally announced October 2018.
-
HyLine: a Simple and Practical Flow Scheduling for Commodity Datacenters
Authors:
Soheil Abbasloo,
Yang Xu,
H. Jonathan Chao
Abstract:
Today's datacenter networks (DCNs) have been built upon multipath topologies where each path contains multiple links. However, flow scheduling schemes proposed to minimize flow completion times (FCT) in DCNs are based on algorithms which are optimum or close-to-optimum only over single link. Moreover, most of these scheduling schemes seek either fully centralized approaches having overhead of comm…
▽ More
Today's datacenter networks (DCNs) have been built upon multipath topologies where each path contains multiple links. However, flow scheduling schemes proposed to minimize flow completion times (FCT) in DCNs are based on algorithms which are optimum or close-to-optimum only over single link. Moreover, most of these scheduling schemes seek either fully centralized approaches having overhead of communicating to a central entity or fully distributed approaches requiring changes in the fabric. Motivated by these shortcomings, we present HyLine a simple scheduling design for commodity DCNs which is equipped with a joint load-balancing and flow scheduling (path-aware) design exploiting the multipath nature of DCNs. HyLine takes a hybrid approach and uses the global-awareness of centralized and agility of distributed techniques without requiring any changes in the fabric. To that end, it determines a threshold margin identifying flows for which using centralized approach is beneficial. We have shown through extensive ns2 simulations that despite HyLine's simplicity, it significantly outperforms existing schemes and achieves lower average and 99th percentile FCTs. For instance, compared to Qjump-state-of-the-art practical scheme-and pFabric-one of the best performing flow scheduling schemes-HyLine reduces average FCT up to 68% and 31%, respectively, under a production datacenter workload.
△ Less
Submitted 18 July, 2018;
originally announced July 2018.
-
Cellular Controlled Delay TCP (C2TCP)
Authors:
Soheil Abbasloo,
Tong Li,
Yang Xu,
H. Jonathan Chao
Abstract:
Cellular networks have special characteristics including highly variable channels, fast fluctuating capacities, deep per user buffers, self-inflicted queuing delays, radio uplink/downlink scheduling delays, etc. These distinguishing properties make the problem of achieving low latency and high throughput in cellular networks more challenging than in wired networks. That's why in this environment,…
▽ More
Cellular networks have special characteristics including highly variable channels, fast fluctuating capacities, deep per user buffers, self-inflicted queuing delays, radio uplink/downlink scheduling delays, etc. These distinguishing properties make the problem of achieving low latency and high throughput in cellular networks more challenging than in wired networks. That's why in this environment, TCP and its flavors, which are generally designed for wired networks, perform poorly.
To cope with these challenges, we present C2TCP, a flexible end-to-end solution targeting interactive applications requiring high throughput and low delay in cellular networks. C2TCP stands on top of loss-based TCP and brings it delay sensitivity without requiring any network state profiling, channel prediction, or complicated rate adjustment mechanisms. The key idea behind C2TCP is to absorb dynamics of unpredictable cellular channels by investigating local minimum delay of packets in a moving time window and react to the cellular network's capacity changes very fast.
Through extensive trace-based evaluations using traces from five commercial LTE and 3G networks, we have compared performance of C2TCP with various TCP variants, and state-of-the-art schemes including BBR, Verus, and Sprout. Results show that on average, C2TCP outperforms these schemes and achieves lower average and 95th percentile delay for packets.
△ Less
Submitted 7 July, 2018;
originally announced July 2018.
-
Adaptive Path-Integral Autoencoder: Representation Learning and Planning for Dynamical Systems
Authors:
Jung-Su Ha,
Young-** Park,
Hyeok-Joo Chae,
Soon-Seo Park,
Han-Lim Choi
Abstract:
We present a representation learning algorithm that learns a low-dimensional latent dynamical system from high-dimensional \textit{sequential} raw data, e.g., video. The framework builds upon recent advances in amortized inference methods that use both an inference network and a refinement procedure to output samples from a variational distribution given an observation sequence, and takes advantag…
▽ More
We present a representation learning algorithm that learns a low-dimensional latent dynamical system from high-dimensional \textit{sequential} raw data, e.g., video. The framework builds upon recent advances in amortized inference methods that use both an inference network and a refinement procedure to output samples from a variational distribution given an observation sequence, and takes advantage of the duality between control and inference to approximately solve the intractable inference problem using the path integral control approach. The learned dynamical model can be used to predict and plan the future states; we also present the efficient planning method that exploits the learned low-dimensional latent dynamics. Numerical experiments show that the proposed path-integral control based variational inference method leads to tighter lower bounds in statistical model learning of sequential data. The supplementary video: https://youtu.be/xCp35crUoLQ
△ Less
Submitted 3 January, 2019; v1 submitted 5 July, 2018;
originally announced July 2018.
-
Spotlight: Scalable Transport Layer Load Balancing for Data Center Networks
Authors:
Ashkan Aghdai,
Cing-Yu Chu,
Yang Xu,
David H. Dai,
Jun Xu,
H. Jonathan Chao
Abstract:
Load Balancing plays a vital role in modern data centers to distribute traffic among instances of network functions or services. State-of-the-art load balancers such as Silkroad dispatch traffic obliviously without considering the real-time utilization of service instances and therefore can lead to uneven load distribution and suboptimal performance.
In this paper, we design and implement Spotli…
▽ More
Load Balancing plays a vital role in modern data centers to distribute traffic among instances of network functions or services. State-of-the-art load balancers such as Silkroad dispatch traffic obliviously without considering the real-time utilization of service instances and therefore can lead to uneven load distribution and suboptimal performance.
In this paper, we design and implement Spotlight, a scalable and distributed load balancing architecture that maintains connection-to-instance map** consistency at the edge of data center networks. Spotlight uses a new stateful flow dispatcher which periodically polls instances' load and dispatches incoming connections to instances in proportion to their available capacity. Our design utilizes distributed control plane and in-band flow dispatching and thus scales horizontally in data center networks. Through extensive flow-level simulation and packet-level experiments on a testbed, we demonstrate that compared to existing methods Spotlight distributes the traffic more efficiently and has near-optimum performance in terms of overall service utilization. Moreover, Spotlight is not sensitive to utilization polling interval and therefore can be implemented with low polling frequency to reduce the amount of control traffic. Indeed, Spotlight achieves the mentioned performance improvements using O(100ms) polling interval.
△ Less
Submitted 23 February, 2019; v1 submitted 21 June, 2018;
originally announced June 2018.
-
A Survey of Parallel Sequential Pattern Mining
Authors:
Wensheng Gan,
Jerry Chun-Wei Lin,
Philippe Fournier-Viger,
Han-Chieh Chao,
Philip S. Yu
Abstract:
With the growing popularity of shared resources, large volumes of complex data of different types are collected automatically. Traditional data mining algorithms generally have problems and challenges including huge memory cost, low processing speed, and inadequate hard disk space. As a fundamental task of data mining, sequential pattern mining (SPM) is used in a wide variety of real-life applicat…
▽ More
With the growing popularity of shared resources, large volumes of complex data of different types are collected automatically. Traditional data mining algorithms generally have problems and challenges including huge memory cost, low processing speed, and inadequate hard disk space. As a fundamental task of data mining, sequential pattern mining (SPM) is used in a wide variety of real-life applications. However, it is more complex and challenging than other pattern mining tasks, i.e., frequent itemset mining and association rule mining, and also suffers from the above challenges when handling the large-scale data. To solve these problems, mining sequential patterns in a parallel or distributed computing environment has emerged as an important issue with many applications. In this paper, an in-depth survey of the current status of parallel sequential pattern mining (PSPM) is investigated and provided, including detailed categorization of traditional serial SPM approaches, and state of the art parallel SPM. We review the related work of parallel sequential pattern mining in detail, including partition-based algorithms for PSPM, Apriori-based PSPM, pattern growth based PSPM, and hybrid algorithms for PSPM, and provide deep description (i.e., characteristics, advantages, disadvantages and summarization) of these parallel approaches of PSPM. Some advanced topics for PSPM, including parallel quantitative / weighted / utility sequential pattern mining, PSPM from uncertain data and stream data, hardware acceleration for PSPM, are further reviewed in details. Besides, we review and provide some well-known open-source software of PSPM. Finally, we summarize some challenges and opportunities of PSPM in the big data era.
△ Less
Submitted 4 April, 2019; v1 submitted 26 May, 2018;
originally announced May 2018.
-
A Survey of Utility-Oriented Pattern Mining
Authors:
Wensheng Gan,
Jerry Chun-Wei Lin,
Philippe Fournier-Viger,
Han-Chieh Chao,
Vincent S. Tseng,
Philip S. Yu
Abstract:
The main purpose of data mining and analytics is to find novel, potentially useful patterns that can be utilized in real-world applications to derive beneficial knowledge. For identifying and evaluating the usefulness of different kinds of patterns, many techniques and constraints have been proposed, such as support, confidence, sequence order, and utility parameters (e.g., weight, price, profit,…
▽ More
The main purpose of data mining and analytics is to find novel, potentially useful patterns that can be utilized in real-world applications to derive beneficial knowledge. For identifying and evaluating the usefulness of different kinds of patterns, many techniques and constraints have been proposed, such as support, confidence, sequence order, and utility parameters (e.g., weight, price, profit, quantity, satisfaction, etc.). In recent years, there has been an increasing demand for utility-oriented pattern mining (UPM, or called utility mining). UPM is a vital task, with numerous high-impact applications, including cross-marketing, e-commerce, finance, medical, and biomedical applications. This survey aims to provide a general, comprehensive, and structured overview of the state-of-the-art methods of UPM. First, we introduce an in-depth understanding of UPM, including concepts, examples, and comparisons with related concepts. A taxonomy of the most common and state-of-the-art approaches for mining different kinds of high-utility patterns is presented in detail, including Apriori-based, tree-based, projection-based, vertical-/horizontal-data-format-based, and other hybrid approaches. A comprehensive review of advanced topics of existing high-utility pattern mining techniques is offered, with a discussion of their pros and cons. Finally, we present several well-known open-source software packages for UPM. We conclude our survey with a discussion on open and practical challenges in this field.
△ Less
Submitted 16 September, 2019; v1 submitted 26 May, 2018;
originally announced May 2018.
-
Hidden Vehicle Sensing via Asynchronous V2V Transmission: A Multi-Path-Geometry Approach
Authors:
Kaifeng Han,
Seung-Woo Ko,
Hyuk** Chae,
Byoung-Hoon Kim,
Kaibin Huang
Abstract:
Accurate vehicular sensing is a basic and important operation in autonomous driving. Unfortunately, the existing techniques have their own limitations. For instance, the communication-based approach (e.g., transmission of GPS information) has high latency and low reliability while the reflection-based approach (e.g., RADAR) is incapable of detecting hidden vehicles (HVs) without line-of-sight. Thi…
▽ More
Accurate vehicular sensing is a basic and important operation in autonomous driving. Unfortunately, the existing techniques have their own limitations. For instance, the communication-based approach (e.g., transmission of GPS information) has high latency and low reliability while the reflection-based approach (e.g., RADAR) is incapable of detecting hidden vehicles (HVs) without line-of-sight. This is arguably the reason behind some recent fatal accidents involving autonomous vehicles. To address this issue, this paper presents a novel HV-sensing technology that exploits multi-path transmission from a HV to a sensing vehicle (SV). The powerful technology enables the SV to detect multiple HV-state parameters including position, orientation of driving direction, and size. Its implementation does not even require transmitter-receiver synchronization like conventional mobile positioning techniques. Our design approach leverages estimated information on multi-path (AoA/AoD/ToA) and their geometric relations. As a result, a complex system of equations or optimization problems, where the desired HV-state parameters are variables, can be formulated for different channel-noise conditions. The development of intelligent solution methods ranging from least-square estimator to disk/box minimization yields a set of practical HV-sensing techniques. We study their feasibility conditions in terms of the required number of paths. Furthermore, practical solutions, including sequential path combining and random directional beamforming, are proposed to enable HV-sensing given insufficient paths. Last, realistic simulation of driving in both highway and rural scenarios demonstrates the effectiveness of the proposed techniques. In summary, the proposed technique will enhance the capabilities of existing vehicular sensing technologies by enabling HV-sensing.
△ Less
Submitted 17 May, 2019; v1 submitted 28 April, 2018;
originally announced April 2018.
-
Jointly Localizing and Describing Events for Dense Video Captioning
Authors:
Yehao Li,
Ting Yao,
Yingwei Pan,
Hongyang Chao,
Tao Mei
Abstract:
Automatically describing a video with natural language is regarded as a fundamental challenge in computer vision. The problem nevertheless is not trivial especially when a video contains multiple events to be worthy of mention, which often happens in real videos. A valid question is how to temporally localize and then describe events, which is known as "dense video captioning." In this paper, we p…
▽ More
Automatically describing a video with natural language is regarded as a fundamental challenge in computer vision. The problem nevertheless is not trivial especially when a video contains multiple events to be worthy of mention, which often happens in real videos. A valid question is how to temporally localize and then describe events, which is known as "dense video captioning." In this paper, we present a novel framework for dense video captioning that unifies the localization of temporal event proposals and sentence generation of each proposal, by jointly training them in an end-to-end manner. To combine these two worlds, we integrate a new design, namely descriptiveness regression, into a single shot detection structure to infer the descriptive complexity of each detected proposal via sentence generation. This in turn adjusts the temporal locations of each event proposal. Our model differs from existing dense video captioning methods since we propose a joint and global optimization of detection and captioning, and the framework uniquely capitalizes on an attribute-augmented video captioning architecture. Extensive experiments are conducted on ActivityNet Captions dataset and our framework shows clear improvements when compared to the state-of-the-art techniques. More remarkably, we obtain a new record: METEOR of 12.96% on ActivityNet Captions official test set.
△ Less
Submitted 23 April, 2018;
originally announced April 2018.
-
A Determination Scheme for Quasi-Identifiers Using Uniqueness and Influence for De-Identification of Clinical Data
Authors:
Jipmin Jung,
Phillip Park,
Jaedong Lee,
Hyein Lee,
Geonkook Lee,
Hyosoung Cha
Abstract:
Objectives; The accumulation and usefulness of clinical data have increased with IT development. While using clinical data that needs to be identifiable to obtain meaningful information, it is essential to ensure that data is de-identified and unnecessary clinical information is minimized to protect personal information. This process requires criteria and an appropriate method as there are clear i…
▽ More
Objectives; The accumulation and usefulness of clinical data have increased with IT development. While using clinical data that needs to be identifiable to obtain meaningful information, it is essential to ensure that data is de-identified and unnecessary clinical information is minimized to protect personal information. This process requires criteria and an appropriate method as there are clear identifiers as well as quasi-identifiers that are not readily identifiable. Methods; To formulate such a method, first, primary quasi-identifiers were selected by classifying information in 20 clinical personal information database tables into Direct-Identifier (DID), Quasi-Identifier (QI), Sensitive Attribute (SA), and Non-Sensitive Attribute (NSA) according to its type. Secondary QIs were then selected by assessing the risk for outliers by measuring uniqueness values of the selected data and scoring re-identification by calculating equivalence class of the influence on other data on QI removal. Third, the risk of re-identification of data users was numeralized and classified. Lastly, the final QI according to user class was determined by comparing the calculated re-identification scores to the threshold values of user classes. Results; Eventually, final QIs ranging from a minimum of 18 to a maximum of 28 were selected by making an assumption about user classes and using it as criteria. Conclusions; The QI selection method presented by the current investigators can be used by researchers at the final checkup stage before they de-identify the selected QIs. Therefore, clinical data users can securely and efficiently use clinical data containing personal information by objectively selecting QIs using the method proposed in the present study.
△ Less
Submitted 12 April, 2018;
originally announced April 2018.
-
Dirac Electrons in a Dodecagonal Graphene Quasicrystal
Authors:
Sung Joon Ahn,
Pilkyung Moon,
Tae-Hoon Kim,
Hyun-Woo Kim,
Ha-Chul Shin,
Eun Hye Kim,
Hyun Woo Cha,
Se-Jong Kahng,
Philip Kim,
Mikito Koshino,
Young-Woo Son,
Cheol-Woong Yang,
Joung Real Ahn
Abstract:
Quantum states of quasiparticles in solids are dictated by symmetry. Thus, a discovery of unconventional symmetry can provide a new opportunity to reach a novel quantum state. Recently, Dirac and Weyl electrons have been observed in crystals with discrete translational symmetry. Here we experimentally demonstrate Dirac electrons in a two-dimensional quasicrystal without translational symmetry. A d…
▽ More
Quantum states of quasiparticles in solids are dictated by symmetry. Thus, a discovery of unconventional symmetry can provide a new opportunity to reach a novel quantum state. Recently, Dirac and Weyl electrons have been observed in crystals with discrete translational symmetry. Here we experimentally demonstrate Dirac electrons in a two-dimensional quasicrystal without translational symmetry. A dodecagonal quasicrystal was realized by epitaxial growth of twisted bilayer graphene rotated exactly 30 degree. The graphene quasicrystal was grown up to a millimeter scale on SiC(0001) surface while maintaining the single rotation angle over an entire sample and was successfully isolated from a substrate, demonstrating its structural and chemical stability under ambient conditions. Multiple Dirac cone replicated with the 12-fold rotational symmetry were observed in angle resolved photoemission spectra, showing its unique electronic structures with anomalous strong interlayer coupling with quasi-periodicity. Our study provides a new way to explore physical properties of relativistic fermions with controllable quasicrystalline orders.
△ Less
Submitted 11 April, 2018;
originally announced April 2018.
-
Sensing Hidden Vehicles by Exploiting Multi-Path V2V Transmission
Authors:
Kaifeng Han,
Seung-Woo Ko,
Hyuk** Chae,
Byoung-Hoon Kim,
Kaibin Huang
Abstract:
This paper presents a technology of sensing hidden vehicles by exploiting multi-path vehicle-to-vehicle (V2V) communication. This overcomes the limitation of existing RADAR technologies that requires line-of-sight (LoS), thereby enabling more intelligent manoeuvre in autonomous driving and improving its safety. The proposed technology relies on transmission of orthogonal waveforms over different a…
▽ More
This paper presents a technology of sensing hidden vehicles by exploiting multi-path vehicle-to-vehicle (V2V) communication. This overcomes the limitation of existing RADAR technologies that requires line-of-sight (LoS), thereby enabling more intelligent manoeuvre in autonomous driving and improving its safety. The proposed technology relies on transmission of orthogonal waveforms over different antennas at the target (hidden) vehicle. Even without LoS, the resultant received signal enables the sensing vehicle to detect the position, shape, and driving direction of the hidden vehicle by jointly analyzing the geometry (AoA/AoD/propagation distance) of individual propagation path. The accuracy of the proposed technique is validated by realistic simulation including both highway and rural scenarios.
△ Less
Submitted 10 April, 2018;
originally announced April 2018.
-
Sense-and-Predict: Harnessing Spatial Interference Correlation for Cognitive Radio Networks
Authors:
Seunghwan Kim,
Han Cha,
Jeemin Kim,
Seung-Woo Ko,
Seong-Lyun Kim
Abstract:
Cognitive radio (CR) is a key enabler realizing future networks to achieve higher spectral efficiency by allowing spectrum sharing between different wireless networks. It is important to explore whether spectrum access opportunities are available, but conventional CR based on transmitter (TX) sensing cannot be used to this end because the paired receiver (RX) may experience different levels of int…
▽ More
Cognitive radio (CR) is a key enabler realizing future networks to achieve higher spectral efficiency by allowing spectrum sharing between different wireless networks. It is important to explore whether spectrum access opportunities are available, but conventional CR based on transmitter (TX) sensing cannot be used to this end because the paired receiver (RX) may experience different levels of interference, according to the extent of their separation, blockages, and beam directions. To address this problem, this paper proposes a novel form of medium access control (MAC) termed sense-and-predict (SaP), whereby each secondary TX predicts the interference level at the RX based on the sensed interference at the TX; this can be quantified in terms of a spatial interference correlation between the two locations. Using stochastic geometry, the spatial interference correlation can be expressed in the form of a conditional coverage probability, such that the signal-to-interference ratio (SIR) at the RX is no less than a predetermined threshold given the sensed interference at the TX, defined as an opportunistic probability (OP). The secondary TX randomly accesses the spectrum depending on OP. We optimize the SaP framework to maximize the area spectral efficiencies (ASEs) of secondary networks while guaranteeing the service quality of the primary networks. Testbed experiments using USRP and MATLAB simulations show that SaP affords higher ASEs compared with CR without prediction.
△ Less
Submitted 4 February, 2019; v1 submitted 4 February, 2018;
originally announced February 2018.
-
Opportunism in Dynamic Spectrum Access for 5G: A Concept and Its Application to Duplexing
Authors:
Jeemin Kim,
Soo-Min Kim,
Han Cha,
**ho Choi,
Seung-Woo Ko,
Chan-Byoung Chae,
Seong-Lyun Kim
Abstract:
With the envisioned massive Internet-of-Things (IoT) era, one of the challenges for 5G wireless systems will be handling the unprecedented spectrum crunch. A potential solution has emerged in the form of spectrum sharing, which deviates from a monopolistic spectrum usage system. This article investigates the medium access control (MAC) as a means of increasing the viability of the spectrum sharing…
▽ More
With the envisioned massive Internet-of-Things (IoT) era, one of the challenges for 5G wireless systems will be handling the unprecedented spectrum crunch. A potential solution has emerged in the form of spectrum sharing, which deviates from a monopolistic spectrum usage system. This article investigates the medium access control (MAC) as a means of increasing the viability of the spectrum sharing technique. We first quantify the opportunity of spectrum access in a probabilistic manner, a method referred to as opportunity probability (OP). Based on the OP framework, we propose a random MAC algorithm in which the access of a node is randomly determined with its own OP value. As a possible application of our OP based random MAC, we propose a hybrid half duplex (HD)/full duplex (FD) communication where each pair decides the duplexing mode according to the OP values of the two pair nodes. This approach fits well with the spectrum sharing system since it enables a flexible operation for the spectrum access according to the spectrum usage level. From the numerical analysis, we validate the feasibility and verify the performance enhancements by implementing an FPGA based real-time prototype. Measurements and numerical results confirm that the proposed architecture can achieve up to 4 times higher system throughput than conventional LTE-TDD (time division duplex) systems.
△ Less
Submitted 22 January, 2018;
originally announced January 2018.
-
Approximate Inference-based Motion Planning by Learning and Exploiting Low-Dimensional Latent Variable Models
Authors:
Jung-Su Ha,
Hyeok-Joo Chae,
Han-Lim Choi
Abstract:
This work presents an efficient framework to generate a motion plan of a robot with high degrees of freedom (e.g., a humanoid robot). High-dimensionality of the robot configuration space often leads to difficulties in utilizing the widely-used motion planning algorithms, since the volume of the decision space increases exponentially with the number of dimensions. To handle complications arising fr…
▽ More
This work presents an efficient framework to generate a motion plan of a robot with high degrees of freedom (e.g., a humanoid robot). High-dimensionality of the robot configuration space often leads to difficulties in utilizing the widely-used motion planning algorithms, since the volume of the decision space increases exponentially with the number of dimensions. To handle complications arising from the large decision space, and to solve a corresponding motion planning problem efficiently, two key concepts are adopted in this work: First, the Gaussian process latent variable model (GP-LVM) is utilized for low-dimensional representation of the original configuration space. Second, an approximate inference algorithm is used, exploiting through the duality between control and estimation, to explore the decision space and to compute a high-quality motion trajectory of the robot. Utilizing the GP-LVM and the duality between control and estimation, we construct a fully probabilistic generative model with which a high-dimensional motion planning problem is transformed into a tractable inference problem. Finally, we compute the motion trajectory via an approximate inference algorithm based on a variant of the particle filter. The resulting motions can be viewed in the supplemental video. ( https://youtu.be/kngEaOR4Esc )
△ Less
Submitted 1 August, 2018; v1 submitted 22 November, 2017;
originally announced November 2017.
-
On Optimal Operational Sequence of Components in a Warm Standby System
Authors:
M. Finkelstein,
N. K. Hazra,
J. H. Cha
Abstract:
We consider an open problem of optimal operational sequence for the $1$-out-of-$n$ system with warm standby. Using the virtual age concept and the cumulative exposure model, we show that the components should be activated in accordance with the increasing sequence of their lifetimes. Lifetimes of the components and the system are compared with respect to the stochastic precedence order. Only speci…
▽ More
We consider an open problem of optimal operational sequence for the $1$-out-of-$n$ system with warm standby. Using the virtual age concept and the cumulative exposure model, we show that the components should be activated in accordance with the increasing sequence of their lifetimes. Lifetimes of the components and the system are compared with respect to the stochastic precedence order. Only specific cases of this optimal problem were considered in the literature previously.
△ Less
Submitted 6 December, 2018; v1 submitted 18 October, 2017;
originally announced October 2017.
-
Population Density-based Hospital Recommendation with Mobile LBS Big Data
Authors:
Hanqing Chao,
Yuan Cao,
Jun** Zhang,
Fen Xia,
Ye Zhou,
Hongming Shan
Abstract:
The difficulty of getting medical treatment is one of major livelihood issues in China. Since patients lack prior knowledge about the spatial distribution and the capacity of hospitals, some hospitals have abnormally high or sporadic population densities. This paper presents a new model for estimating the spatiotemporal population density in each hospital based on location-based service (LBS) big…
▽ More
The difficulty of getting medical treatment is one of major livelihood issues in China. Since patients lack prior knowledge about the spatial distribution and the capacity of hospitals, some hospitals have abnormally high or sporadic population densities. This paper presents a new model for estimating the spatiotemporal population density in each hospital based on location-based service (LBS) big data, which would be beneficial to guiding and dispersing outpatients. To improve the estimation accuracy, several approaches are proposed to denoise the LBS data and classify people by detecting their various behaviors. In addition, a long short-term memory (LSTM) based deep learning is presented to predict the trend of population density. By using Baidu large-scale LBS logs database, we apply the proposed model to 113 hospitals in Bei**g, P. R. China, and constructed an online hospital recommendation system which can provide users with a hospital rank list basing the real-time population density information and the hospitals' basic information such as hospitals' levels and their distances. We also mine several interesting patterns from these LBS logs by using our proposed system.
△ Less
Submitted 2 August, 2017;
originally announced August 2017.
-
Design of a Hybrid Modular Switch
Authors:
Ashkan Aghdai,
Yang Xu,
H. Jonathan Chao
Abstract:
Network Function Virtualization (NFV) shed new light for the design, deployment, and management of cloud networks. Many network functions such as firewalls, load balancers, and intrusion detection systems can be virtualized by servers. However, network operators often have to sacrifice programmability in order to achieve high throughput, especially at networks' edge where complex network functions…
▽ More
Network Function Virtualization (NFV) shed new light for the design, deployment, and management of cloud networks. Many network functions such as firewalls, load balancers, and intrusion detection systems can be virtualized by servers. However, network operators often have to sacrifice programmability in order to achieve high throughput, especially at networks' edge where complex network functions are required.
Here, we design, implement, and evaluate Hybrid Modular Switch (HyMoS). The hybrid hardware/software switch is designed to meet requirements for modern-day NFV applications in providing high-throughput, with a high degree of programmability. HyMoS utilizes P4-compatible Network Interface Cards (NICs), PCI Express interface and CPU to act as line cards, switch fabric, and fabric controller respectively. In our implementation of HyMos, PCI Express interface is turned into a non-blocking switch fabric with a throughput of hundreds of Gigabits per second.
Compared to existing NFV infrastructure, HyMoS offers modularity in hardware and software as well as a higher degree of programmability by supporting a superset of P4 language.
△ Less
Submitted 28 May, 2017;
originally announced May 2017.
-
Probabilistic Vehicle Trajectory Prediction over Occupancy Grid Map via Recurrent Neural Network
Authors:
ByeoungDo Kim,
Chang Mook Kang,
Seung Hi Lee,
Hyunmin Chae,
Jaekyum Kim,
Chung Choo Chung,
Jun Won Choi
Abstract:
In this paper, we propose an efficient vehicle trajectory prediction framework based on recurrent neural network. Basically, the characteristic of the vehicle's trajectory is different from that of regular moving objects since it is affected by various latent factors including road structure, traffic rules, and driver's intention. Previous state of the art approaches use sophisticated vehicle beha…
▽ More
In this paper, we propose an efficient vehicle trajectory prediction framework based on recurrent neural network. Basically, the characteristic of the vehicle's trajectory is different from that of regular moving objects since it is affected by various latent factors including road structure, traffic rules, and driver's intention. Previous state of the art approaches use sophisticated vehicle behavior model describing these factors and derive the complex trajectory prediction algorithm, which requires a system designer to conduct intensive model optimization for practical use. Our approach is data-driven and simple to use in that it learns complex behavior of the vehicles from the massive amount of trajectory data through deep neural network model. The proposed trajectory prediction method employs the recurrent neural network called long short-term memory (LSTM) to analyze the temporal behavior and predict the future coordinate of the surrounding vehicles. The proposed scheme feeds the sequence of vehicles' coordinates obtained from sensor measurements to the LSTM and produces the probabilistic information on the future location of the vehicles over occupancy grid map. The experiments conducted using the data collected from highway driving show that the proposed method can produce reasonably good estimate of future trajectory.
△ Less
Submitted 31 August, 2017; v1 submitted 24 April, 2017;
originally announced April 2017.
-
Sense-and-Predict: Opportunistic MAC Based on Spatial Interference Correlation for Cognitive Radio Networks
Authors:
Jeemin Kim,
Seung-Woo Ko,
Han Cha,
Seong-Lyun Kim
Abstract:
Opportunity detection at secondary transmitters (TXs) is a key technique enabling cognitive radio (CR) networks. Such detection however cannot guarantee reliable communication at secondary receivers (RXs), especially when their association distance is long. To cope with the issue, this paper proposes a novel MAC called sense-and-predict (SaP), where each secondary TX decides whether to access or n…
▽ More
Opportunity detection at secondary transmitters (TXs) is a key technique enabling cognitive radio (CR) networks. Such detection however cannot guarantee reliable communication at secondary receivers (RXs), especially when their association distance is long. To cope with the issue, this paper proposes a novel MAC called sense-and-predict (SaP), where each secondary TX decides whether to access or not based on the prediction of the interference level at RX. Firstly, we provide the spatial interference correlation in a probabilistic form using stochastic geometry, and utilize it to maximize the area spectral efficiency (ASE) for secondary networks while guaranteeing the service quality of primary networks. Through simulations and testbed experiments using USRP, SaP is shown to always achieve ASE improvement compared with the conventional TX based sensing.
△ Less
Submitted 12 February, 2017;
originally announced February 2017.
-
Autonomous Braking System via Deep Reinforcement Learning
Authors:
Hyunmin Chae,
Chang Mook Kang,
ByeoungDo Kim,
Jaekyum Kim,
Chung Choo Chung,
Jun Won Choi
Abstract:
In this paper, we propose a new autonomous braking system based on deep reinforcement learning. The proposed autonomous braking system automatically decides whether to apply the brake at each time step when confronting the risk of collision using the information on the obstacle obtained by the sensors. The problem of designing brake control is formulated as searching for the optimal policy in Mark…
▽ More
In this paper, we propose a new autonomous braking system based on deep reinforcement learning. The proposed autonomous braking system automatically decides whether to apply the brake at each time step when confronting the risk of collision using the information on the obstacle obtained by the sensors. The problem of designing brake control is formulated as searching for the optimal policy in Markov decision process (MDP) model where the state is given by the relative position of the obstacle and the vehicle's speed, and the action space is defined as whether brake is stepped or not. The policy used for brake control is learned through computer simulations using the deep reinforcement learning method called deep Q-network (DQN). In order to derive desirable braking policy, we propose the reward function which balances the damage imposed to the obstacle in case of accident and the reward achieved when the vehicle runs out of risk as soon as possible. DQN is trained for the scenario where a vehicle is encountered with a pedestrian crossing the urban road. Experiments show that the control agent exhibits desirable control behavior and avoids collision without any mistake in various uncertain environments.
△ Less
Submitted 24 April, 2017; v1 submitted 8 February, 2017;
originally announced February 2017.
-
Optimal Control-Based UAV Path Planning with Dynamically-Constrained TSP with Neighborhoods
Authors:
Dae-Sung Jang,
Hyeok-Joo Chae,
Han-Lim Choi
Abstract:
This paper addresses path planning of an unmanned aerial vehicle (UAV) with remote sensing capabilities (or wireless communication capabilities). The goal of the path planning is to find a minimum-flight-time closed tour of the UAV visiting all executable areas of given remote sensing and communication tasks; in order to incorporate the nonlinear vehicle dynamics, this problem is regarded as a dyn…
▽ More
This paper addresses path planning of an unmanned aerial vehicle (UAV) with remote sensing capabilities (or wireless communication capabilities). The goal of the path planning is to find a minimum-flight-time closed tour of the UAV visiting all executable areas of given remote sensing and communication tasks; in order to incorporate the nonlinear vehicle dynamics, this problem is regarded as a dynamically-constrained traveling salesman problem with neighborhoods. To obtain a close-to-optimal solution for the path planning in a tractable manner, a sampling-based roadmap algorithm that embeds an optimal control-based path generation process is proposed. The algorithm improves the computational efficiency by reducing numerical computations required for optimizing inefficient local paths, and by extracting additional information from a roadmap of a fixed number of samples. Comparative numerical simulations validate the efficiency of the presented algorithm in reducing computation time and improving the solution quality compared to previous roadmap-based planning methods.
△ Less
Submitted 18 December, 2016;
originally announced December 2016.